1 code implementation • 3 Mar 2023 • Qian Lou, Yepeng Liu, Bo Feng
This paper proposes a solution called TrojText, which aims to determine whether invisible textual Trojan attacks can be performed more efficiently and cost-effectively without training data.
no code implementations • 18 Jan 2022 • Bo Feng, Geoffrey Fox
In contrast, applications in social networks, road traffic, physics, and chemical property prediction where data features can be organized with nodes and edges of graphs.
no code implementations • 15 Jan 2022 • Yang Li, Bo Feng, Bin Wang, Shuchao Sun
In this model, the upper-level aims to seek the optimal location and capacity of DGs and energy storage, while the lower-level optimizes the operation of energy storage devices.
no code implementations • 18 Dec 2021 • Geoffrey Fox, John Rundle, Andrea Donnellan, Bo Feng
We review previous approaches to nowcasting earthquakes and introduce new approaches based on deep learning using three distinct models based on recurrent neural networks and transformers.
no code implementations • 13 Oct 2021 • Junyi Huang, Maxwell Benjamin Strome, Ian Jenkins, Parker Williams, Bo Feng, Yaning Wang, Roman Wang, Vaibhav Bagri, Newman Cheng, Iddo Drori
Kinship verification is the task of determining whether a parent-child, sibling, or grandparent-grandchild relationship exists between two people and is important in social media applications, forensic investigations, finding missing children, and reuniting families.
1 code implementation • 10 Mar 2021 • Li Yang, Mai Xu, Deng Xin, Bo Feng
To alleviate this issue, we propose a spatial attention-based perceptual quality prediction network for non-reference quality assessment on ODIs (SAP-net).
no code implementations • 20 Dec 2020 • Bo Feng, Geoffrey C. Fox
With the enormous amount of data, modern GPU-powered deep learning presents a promising approach to analyze data and discover patterns.
no code implementations • EMNLP 2021 • Bo Feng, Qian Lou, Lei Jiang, Geoffrey C. Fox
Although prior secure networks combine homomorphic encryption (HE) and garbled circuit (GC) to preserve users' privacy, naively adopting the HE and GC hybrid technique to implement RNNs suffers from long inference latency due to slow activation functions.
2 code implementations • 3 Jul 2020 • Alejandro Mera, Bo Feng, Long Lu, Engin Kirda, William Robertson
We present DICE, a drop-in solution for firmware analyzers to emulate DMA input channels and generate or manipulate DMA inputs.
Cryptography and Security
no code implementations • NeurIPS 2020 • Qian Lou, Bo Feng, Geoffrey C. Fox, Lei Jiang
Big data is one of the cornerstones to enabling and training deep neural networks (DNNs).
no code implementations • 11 Feb 2019 • Fanbo Sun, Zhixiang Gu, Bo Feng
Yelp has been one of the most popular local service search engine in US since 2004.